What Is the Attack Scenario Described in “How to Think About Security”?
For example, the bank gives us an account number and informs us that we need to set up our preferred authentication method. In addition to personal identification numbers (PINs), modern systems often add extra information, such as a randomly selected personal question on predetermined topics such as your pet’s name.
This dissertation contributes to four major aspects of social engineering: The history, the anatomy of an ITSE attack, the definition of ITSE, and examples of ITSE. Social engineering is an attack against the vulnerability people present within the security ideal. As long as people continue to be involved with computers, people will be a weakness that must be considered and factored into all security decisions. My dream is that one day, a patch will be developed to prevent people from being such a large vulnerability (Deichmann, 1996).
All the books in here are worth owning—though you may not need to acquire all books on identical or related topics from these lists. Together this compilation documents the best-loved and respected titles in the field.
Deichmann, Ute. Biologists Under Hitler. Cambridge: Harvard U. P. 1996.
Egan, M. September 25, 2008. 120 Idiots Give Up Password for £5 M&S Voucher. June 10, 2009
Erickson, Milton. “Two-Level Communication and the Microdynamics of Trance and Suggestion.” The American Journal of Clinical Hypnosis. 1976.
Evans, Richard. The Third Reich in Power. New York: Penguin 2005.